DoS Pen Testing Considerations

When you’re pen testing for DoS vulnerabilities, a major area of concern is taking down integral resources during the testing phase. The ripple effect of taking out a file server or web resource can be pretty far reaching, especially if bringing the system back online proves challenging after a successful DoS test attack. As with … Read more

DoS Defensive Strategies

Let’s look at some DoS defensive strategies: Disabling Unnecessary Services You can help protect against DoS and DDoS attacks by hardening individual systems and by implementing network measures that protect against such attacks. Using Anti-Malware Real-time virus protection can help prevent bot installations by reducing Trojan infections with bot payloads. This has the effect of … Read more

DoS Targets

DoS attacks result in a multitude of consequences. Let’s look at some common examples of what is seen in the real world, and what you’ll most likely see on the exam: Web Server Compromise A successful DoS attack and subsequent compromise of a web server constitutes the widest public exposure against a specific target. What … Read more